Computer and information sciences topic list of research papers
-
Preface2010 / Nigel Thomas, Jeremy Bradley, William Knottenbelt, Nicolas Dingle, Uli Harder
-
Type Inference for Correspondence Types
Abstract We present a correspondence type/effect system for authenticity in a π-calculus with polarized channels, dependent pair types and effect terms and show how one may, given a process P and an a priori type environment E, generate constraints...
2009 / Andrew D. Gordon, Hans Hüttel, René Rydhof Hansen -
Generic Tools via General Refinement
Abstract Tools have become essential in the formal model-driven development of software but are very time consuming to build and often restricted to a particular semantic interpretation of a particular syntax. This is regrettable since there is...
2008 / Steve Reeves, David Streader -
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language
Abstract We present an algorithm for the translation of security protocol specifications in the HLPSL language developed in the framework of the AVISPA project to a dialect of the applied pi calculus. This algorithm provides us with two interesting...
2005 / Alexey Gotsman, Fabio Massacci, Marco Pistore -
A Calculus of Tactics and Its Operational Semantics
Abstract This paper presents work in progress on a calculus of tactics for a hypothetical interactive theorem prover based on a λ-calculus for higher-order logic (λHOL). The calculus of tactics is an extension of a calculus of open terms for λHOL....
2004 / G.I. Jojgov, H. Geuvers -
Ontological Learner Modeling
Abstract Nowadays, according to information technology development, using e-learning for enhancing the quality of education is very important. One of the problems considered in e-learning is the lack of educational contents adaptation for all...
2012 / Mohammad Reza Fani Sani, Nafiseh Mohammadian, Maryam Hoseini -
SPA: Smart Placement Approach for Cloud-service Datacenter Networks
Abstract Business disciplines expand rapidly, so does the tendency to rely on computer applications and its varying services to support such expansion. Often, this is achieved through introducing physical network infrastructures that provide the...
2015 / Ahmad Nahar Quttoum, Mohannad Tomar, Bayan Khawaldeh, Rana Refai, Alaa Halawani, et al. -
Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.02012 / Melanie Swan
-
Tracking Heterogeneous Dynamic Sensor Node using Fuzzy Logic to Prolong System lifetime in WSN
Abstract Mobility of sensor node in WSN is one of the key advantages of wireless over fixed communication system. But to track the sensor node in the heterogeneous network is more challenging and difficulties. In heterogeneous system, generally...
2012 / Raju Dutta, Sajal Saha, Asish K. Mukhopadhyay -
Customized 3-tier Service Suite Conceptualization in Cloud Computing
Abstract In this paper, we are going to propose Customized 3-tier service suite in cloud computing environment. The use of service specific virtual machines (VMs) in Cloud computing reduces the administration overhead associated with manually...
2012 / Chandan Banerjee, Anirban Kundu, Rana Dattagupta -
Stable Route Link in on-Demand Multicast Routing Protocol for Ad Hoc Networks
Abstract Mobile ad hoc networks (MANET) are provisionally connected networks with no permanent infrastructure. A mobile ad hoc network is a self-organized and energetically reconfigurable wireless network without wired infrastructure and central...
2012 / M. Rajendiran, S.K. Srivatsa -
Formalizing Fact Extraction
Abstract Reverse engineering commonly uses fact extraction to transform source programs to factbases. These factbases are in turn used to determine particular views or aspects of the program, such as its architecture or its anomalous structures....
2004 / Yuan Lin, Richard C. Holt -
Refactoring-aware versioning in Eclipse
Abstract To fully support refactorings in a team development environment we have implemented a refactoring-aware repository provider as an extension plug-in to the Java Development Tools in Eclipse. The versioning system treats refactorings as...
2004 / Torbjörn Ekman, Ulf Asklund -
Multicore and GPU Parallelization of Neural Networks for Face Recognition
Abstract Training of Artificial Neural Networks for large data sets is a time consuming task. Various approaches have been proposed to reduce the efforts, many of them by applying parallelization techniques. In this paper we develop and analyze two...
2013 / Altaf Ahmad Huqqani, Erich Schikuta, Sicen Ye, Peng Chen -
Preface2005 / Hartmut Ehrig, Julia Padberg, Grzegorz Rozenberg
-
Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs
Abstract Side-channel communication is a form of traffic in which malicious parties communicate secretly over a wireless network. This is often established through the modification of Ethernet frame header fields, such as the Frame Check Sequence...
2016 / Brent Moore, Miguel Vargas Martin, Ramiro Liscano -
Study on Linkage Mechanism of IDS and Firewall Based on SNMP Protocol
Abstract This paper firstly introduces the characteristics of Firewall and Intrusion Detection Systems (IDS) and points out the shortcomings of the Firewall. Then it analyzes the linkage mechanism of Firewall and IDS based on SNMP Protocol, and puts ...
2012 / Yu Yuanhui, Li Yongmei, Deng Ying -
A socio friendly approach to the analysis of emotive speech
Abstract This paper describes certain findings of intonation and intensity study of emotive speech with the minimal use of signal processing algorithms. This study was based on six basic emotions and the neutral, elicited from 1660 English...
2012 / Agnes Jacob, P. Mythili -
Controlled mobility in stochastic and dynamic wireless networks2012 / Güner D. Çelik, Eytan H. Modiano
-
A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis2011 / Jonny Karlsson, Laurence S. Dooley, Göran Pulkkis